CorreLog for Virtual Environments

CorreLog Enterprise SIEM server aggregates, correlates and analyses log event data in real time to deliver operational intelligence and visibility across your enterprise. Optimise your Virtual environment through the use of analytics data mined from the wealth of log event information in your organisation. Couple this information with other disparate sources to leverage your operational effectiveness.

Gain valuable insight into event data as It happens across your Virtual infrastructure enabling you to take action on the events that matter. Meet compliance requirements by having all your logs centrally managed and encrypted. See the impact of Hypervisor and external events on your hosts and visa-versa. Act on performance issues quickly, conduct root cause analysis quickly and efficiently. Automate event processing and response handling increasing operational response.

· Single consolidated view of all log event data from across your Virtual infrastructure.

· Log data securely encrypted to meet compliance requirements.

· Correlated alerts and notifications for security, performance and any event

· Programmable responses to any event scenario

· Simplified root cause analysis

· Interface to your trouble ticketing system and Infrastructure framework

· Google like intuitive interface allows for quick access to log data, for search and reporting.

CorreLog SIEM Solution Suite

CorreLog's SIEM solutions and services are designed for maximum interoperability, flexibility, and scalability. CorreLog has the capability to work either independently of, or alongside, other SIEM technology to improve threat management and incident response capabilities. We leverage your existing infrastructure, and processes to return the fastest and best return on your existing investments.

Correlog offers a wide range of deployment options, including multi-tiered and/or highly centralized or decentralized environments, or any combination thereof.

CorreLog Security Compliance Overview

Over time, Government and Industry have cooperated to create multiple security standards that protect you, your employees, and your customers against fraud, theft, and malicious attack. These standards represent the best practices for protecting information. They share numerous common precepts that are easy to implement using the CorreLog system.

CorreLog Security Monitoring

The CorreLog software suite supplies you with powerful and unique capabilities in detecting security problems, breaches, intrusions, and other security events. The CorreLog system is specifically designed to give you the types of functions and features required for security management activities, including support for forensics and auditing, as well as the ability to detect and respond to real-time security breaches Some of the specific benefits of the CorreLog solution include the following:

Product Overview

The CorreLog Server provides a standards-based method of collecting all the system log messages of your network using syslog protocol and SNMP traps. These messages are then correlated into understandable threads, alerts, and actions using sophisticated (but easily configured) rules, and reduced to actionable "tickets" that are sent to users, and which can trigger automatic remediation of incidents.

The CorreLog Server provides special application in security monitoring for your enterprise, and furnishes a variety of special functions and features to support this critical role, including data encryption, ready-to-run correlation rules and TCP tunneling software. Other roles of CorreLog, including performance management, analysis of business information, and log file analysis are also supported within the product.

CorreLog Secure Syslog Forwarder

The CorreLog Secure Syslog Forwarder (SSF) is a concentrator and forwarder for Syslog messages. It accepts Syslog messages from hundreds of simultaneous senders using a variety of protocols – IPv4, IPv6, UDP, and TCP – and forwards them securely to the CorreLog Correlation Server, a competitive Syslog console, or even to another copy of SSF. This extends the life cycle of your software, increases general interoperability of your enterprise software, and promotes a wide variety of accepted standards and specifications. You

Most importantly, the SSF program guarantees verifiable security of your software by implementing advanced and standards based encryption and authentication of your sensitive security data, as well as highly reliable and guaranteed delivery of your log data.